This preview shows page 1. Sign up to view the full content.
Unformatted text preview: 7 34 Algorithm MDC (using MD4) MDC (using MD5) MDC (using SHA) NewDES REDOC II REDOC III RC5-32/8 RC5-32/12 RC5-32/16 RC5-32/20 SAFER (6 rounds) SAFER (8 rounds) SAFER (10 rounds) SAFER (12 rounds) Encryption Speed (Kilobytes/second) 186 135 23 233 1 78 127 86 65 52 81 61 49 41 Luby-Rackoff (using SHA) Lucifer 11 52 3-Way Triple-DES 25 12 Previous Table of Contents Next Products | Contact Us | About Us | Privacy | Ad Info | Home Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Read EarthWeb's privacy statement. To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)
Brief Full Advanced Search Search Tips (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Search this book:
Go! Previous Table of Contents Next
----------- Chapter 15 Combining Block Ciphers
There are many ways to combine block algorithms to get new algorithms. The impetus behind these schemes is to try to increase security without going through the trouble of designing a new algorithm. DES is a secure algorithm; it has been cryptanalyzed for a good 20 years and the most practical way to break it is still brute force. However, the key is too short. Wouldn’t it be nice to use DES as a building block for another algorithm with a longer key? We’d have the best of both worlds: the assurance of two decades of cryptanalysis plus a long key. Multiple encryption is one combination technique: using an algorithm to encrypt the same plaintext block multiple times with multiple keys. Cascading is like multiple encryption, but uses different algorithms. There are other techniques. Encrypting a plaintext block twice with the same key, whether with the same algorithm or a differen...
View Full Document
- Fall '10